Skip to content

Commit

Permalink
Merge pull request #277 from leakingtapan/manifest
Browse files Browse the repository at this point in the history
Rename driver sa, clusterrole and clusterrole binding to be driver specific
  • Loading branch information
k8s-ci-robot committed Apr 9, 2019
2 parents 596c4fd + cfd0f23 commit dbafa92
Showing 1 changed file with 18 additions and 18 deletions.
36 changes: 18 additions & 18 deletions deploy/kubernetes/manifest.yaml
Expand Up @@ -2,15 +2,15 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: csi-controller-sa
name: ebs-csi-controller-sa
namespace: kube-system

---

kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: external-provisioner-role
name: ebs-external-provisioner-role
rules:
- apiGroups: [""]
resources: ["persistentvolumes"]
Expand All @@ -30,22 +30,22 @@ rules:
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: csi-provisioner-binding
name: ebs-csi-provisioner-binding
subjects:
- kind: ServiceAccount
name: csi-controller-sa
name: ebs-csi-controller-sa
namespace: kube-system
roleRef:
kind: ClusterRole
name: external-provisioner-role
name: ebs-external-provisioner-role
apiGroup: rbac.authorization.k8s.io

---

kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: external-attacher-role
name: ebs-external-attacher-role
rules:
- apiGroups: [""]
resources: ["persistentvolumes"]
Expand All @@ -65,22 +65,22 @@ rules:
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: csi-attacher-binding
name: ebs-csi-attacher-binding
subjects:
- kind: ServiceAccount
name: csi-controller-sa
name: ebs-csi-controller-sa
namespace: kube-system
roleRef:
kind: ClusterRole
name: external-attacher-role
name: ebs-external-attacher-role
apiGroup: rbac.authorization.k8s.io

---

kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: cluster-driver-registrar-role
name: ebs-cluster-driver-registrar-role
rules:
- apiGroups: ["apiextensions.k8s.io"]
resources: ["customresourcedefinitions"]
Expand All @@ -94,22 +94,22 @@ rules:
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: csi-driver-registrar-binding
name: ebs-csi-driver-registrar-binding
subjects:
- kind: ServiceAccount
name: csi-controller-sa
name: ebs-csi-controller-sa
namespace: kube-system
roleRef:
kind: ClusterRole
name: cluster-driver-registrar-role
name: ebs-cluster-driver-registrar-role
apiGroup: rbac.authorization.k8s.io

---

kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: external-snapshotter-role
name: ebs-external-snapshotter-role
rules:
- apiGroups: [""]
resources: ["persistentvolumes"]
Expand Down Expand Up @@ -144,14 +144,14 @@ rules:
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: csi-snapshotter-binding
name: ebs-csi-snapshotter-binding
subjects:
- kind: ServiceAccount
name: csi-controller-sa
name: ebs-csi-controller-sa
namespace: kube-system
roleRef:
kind: ClusterRole
name: external-snapshotter-role
name: ebs-external-snapshotter-role
apiGroup: rbac.authorization.k8s.io

---
Expand All @@ -169,7 +169,7 @@ spec:
labels:
app: ebs-csi-controller
spec:
serviceAccount: csi-controller-sa
serviceAccount: ebs-csi-controller-sa
priorityClassName: system-cluster-critical
tolerations:
- key: CriticalAddonsOnly
Expand Down

0 comments on commit dbafa92

Please sign in to comment.